Explore chapters and articles related to this topic
Cyber Security Techniques Management
Published in Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi, Anuj Kumar Singh, Holistic Approach to Quantum Cryptography in Cyber Security, 2023
Meenu Shukla, Fatima Ziya, Sharmila Arun, Suraj Pal Singh
It is very difficult and sometimes becomes impossible to detect the passive attack because in any case it does not involve modification of the data. However, we can implement some protective counter measures to prevent it, including: We can use some encryption techniques to hide messages and make them in an unreadable form for unknown recipients. Some encryption techniques can be implemented in this case:Symmetric keys:The symmetric keys are still having a problem in exchanging the secret key confidentially. As these are the same key at both the ends;that is,the sender and the receiver are having the same secret key to exchange.Public-key encryption:In PKE each party involved in communication and they have two types of keys, one is public key which is known by both the users and another one is private key which is a secret key. An example of this type is using SSL certificates, SSL; more commonly called Transport Layer Security (TLS) is a protocol for encoding Internet traffic and verifying the server's identity. Any website with an HTTPS web address uses SSL/TLS certificates.
Hypertext Transfer Protocol
Published in Giovanni Bartolomeo, Tatiana Kováčiková, Identification and Management of Distributed Data: NGN, Content-Centric Networks and the Web, 2016
Giovanni Bartolomeo, Tatiana Kováčiková
With HTTP authentication, user credentials are transmitted in clear text and are thus subject to eavesdropping. To protect the HTTP connection, more sophisticated cryptographic algorithms are needed. Secure Socket Layer (SSL) is a proprietary protocol to secure TCP/IP communications. Transport Layer Security (TLS; Dierks and Allen 1999; Dierks and Rescorla 2006) is the successor to the SSL and has been standardized by the IETF. TLS may be backward-compatible with SSL (weakening some security features), and therefore it is common to refer to the two protocols with the acronym SSL/TLS. SSL/TLS is application independent, sits on top of the TCP, and seam-lessly provides applications with the transport-like interfaces as if it were a common transport protocol such as TCP. However, unlike traditional transport protocols, SSL/TLS adds security features to prevent eavesdropping, tampering, and message forgery.
Security for Networked A/V Systems
Published in Al Kovalick, Video Systems in an IT Environment, 2013
The Secure Sockets Layer (SSL) is used most often to secure HTTP, and the combination is called HPPTS (as seen with https://). Virtually all common Internet browsers support SSL natively, which is a big convenience for “any client” (kiosks, wireless hotspots, Internet café, etc.) secure remote access. While SSL can add security to any protocol that uses TCP, it occurs most commonly with the HTTPS access method. HTTPS serves to secure Web page access. SSL uses public key cryptography and public key certificates to verify the identity of end points. The term Transport Layer Security (TLS) has somewhat replaced SSL, but both are used to describe essentially the same functionality.
Artificial Intelligence and Cyber Defense System for Banking Industry: A Qualitative Study of AI Applications and Challenges
Published in Cybernetics and Systems, 2022
Khalifa AL-Dosari, Noora Fetais, Murat Kucukvar
Chat bots may create privacy risks and result in data leakage. The respondents reported that Qatar banks use traditional methods, such as SSL encryption and two-factor authentication, to combat this threat. SSL ensures that the information exchanged through the connection is private. Two-factor authentication requires the user to verify their identity by retrieving a code sent to another device.
Design and implementation of an extensive-process method for improving the processing efficiency and capacity of the production logistics system
Published in Journal of the Chinese Institute of Engineers, 2023
Heng Ding, Yude Dong, Zhonghang Yuan, Jinbiao Wang, Yuanchang Chen, Zhihao Huang, Haoyu Gao, Suyun Huang
•The secure socket protocol (SSL) is a communication protocol for transmitting private documents over the Internet. It uses public and private keys to encrypt data. Use SSL to create a secure connection between the client and the web layer.
Application of internet of things-based efficient security solution for industrial
Published in Production Planning & Control, 2023
Mohammed Hasan Ali, Mustafa Musa Jaber, Sura Khalil Abd, Ahmed Alkhayyat, Malik R. Q, Mohammad Hussain Ali
The IIoT infrastructure schemes are shown in Figure 1. Various possible approaches for secured communication and control in IIoT via (cloud platform) or at the leading level around Figure 1 have been suggested. Authors have introduced technology for understanding IoT, controlling access, downloading and identifying viruses for data protection. Technologies for breach detection, sometimes referred to as intrusion prevention solutions, can aid in locating dangers within the system. They are either devices or software devices that can identify current risks and notify the proper armed officers that they must act decisively. If an assault breaches cloud-based security measures effectively, few documented solutions to assure the safety of a CPS are available. The local safety of CPS is not responsible operationally for these works. The closest work the author could detect shows that the primary part of the middleware layer is an IoT name resolution service. The technique to detect and minimise safety hazards initially requires specific CPS limits for the IIoT. The network connection management is then set to these criteria by the CPS. Figure 1 illustrates the position of the heating fan sensor and refrigeration ventilators as described in the above paragraph, in the IIoT System and sensor system outdoor, the scattered line box. The microcontroller Raspberry Pi is the feature of every block with a dotted line. The microprocessor performs analogue signal, response time I/O, and occasionally low-power sleeping modes, whereas the Raspberry Pi manages computing, internet connectivity, as well as memory. The Raspberry Pi Pico is inexpensive but simple to utilise. The IIoT Control System controls cooling and heat supply, as indicated in the above section. The monitoring device identifies all uneven CPS activities. An information security technology called SSL, or Safe Socket Level, is mainly utilised to ensure the safe web access or safeguard sensitive information. This method can support both server-to-server and server-to-server communications. The protocol of the security system provides appropriate web security protocols based on tracking system data. The Messaging Platform transmits the important message to the users based on data from the IIoT control system. The last part of the normal surgery is stated in our circumstances. The messaging service will alert the IIoT Gateway if the optimal temperature cannot be maintained for at least 30 s. All data transmission with the IIoT Gateways is discontinued if the objective atmosphere’s temperatures do not stabilise within 50 s.